ot security

  1. CISA September 18 ICS Advisories: 9 Cross-Vendor OT Vulnerabilities You Must Patch

    CISA’s September 18 bulletin published nine new Industrial Control Systems (ICS) advisories that affect a broad cross-section of OT vendors — from industrial networking stacks to remote terminal units, asset-management suites, machine-vision firmware, and industry-specific protocols —...
  2. Hitachi Service Suite: Critical CVE-2020-2883 Risk and Mitigations (CVSS 9.3)

    Hitachi Energy’s Service Suite is the subject of a high‑severity security advisory republished by vendor PSIRT and reflected in government guidance: a deserialization flaw tied to Oracle WebLogic (CVE‑2020‑2883) is implicated in the Service Suite advisory, and the combined risk profile is rated...
  3. WeOS 5 ESP Vulnerability CVE-2025-46419 - Patch to 5.24.0

    Westermo’s industrial networking OS, WeOS 5, contains a remote-denial vulnerability that can trigger an immediate reboot when the device is configured for IPsec and sent a carefully crafted Encapsulating Security Payload (ESP) packet — an issue tracked as CVE‑2025‑46419 and documented by both...
  4. Westermo WeOS 5 OS Command Injection (CVE-2025-46418) - Risks & Mitigations

    Westermo’s WeOS 5 series has a newly disclosed high‑severity vulnerability that deserves immediate attention from industrial network operators and Windows network teams responsible for OT‑IT convergence, because it can be used to inject operating‑system commands when an attacker can reach an...
  5. CISA Advises on Cognex In‑Sight Risks: Mitigate Legacy Camera Vulnerabilities

    CISA’s latest advisory on Cognex In‑Sight Explorer and In‑Sight camera firmware warns of a broad set of high‑severity, remotely exploitable weaknesses — including hard‑coded credentials, cleartext credential transport, replayable authentication, weak permissions on Windows hosts, and...
  6. Urgent Patch for ProGauge MagLink LX: Stop Remote Access to Tank Gauges

    Dover Fueling Solutions’ ProGauge MagLink family is at the center of a critical industrial‑control security alert that should be on every fuel‑site operator’s incident response checklist today: the U.S. Cybersecurity and Infrastructure Security Agency (CISA) published a high‑severity advisory...
  7. Mitigating OS Command Injection in Schneider Saitel RTUs (CVE-2025-9996/9997)

    Schneider Electric has published coordinated advisories describing two OS command injection flaws in the BLMon monitoring console used by Saitel DR and Saitel DP Remote Terminal Units (RTUs), vulnerabilities that allow authenticated console users to inject and execute arbitrary shell commands...
  8. Urgent Patch: Delta DIALink CVEs (CVE-2025-58320/58321) Path Traversal

    Delta Electronics’ DIALink — a widely used industrial automation server — is the subject of a coordinated vulnerability disclosure that identifies two directory‑traversal / authentication‑bypass flaws (CVE‑2025‑58320 and CVE‑2025‑58321) affecting DIALink versions V1.6.0.0 and earlier, and urges...
  9. Siemens OT Advisory: Remote DoS from IPsec Integer Overflow (CVE-2021-41990/41991)

    Siemens ProductCERT and CISA republished an advisory detailing remote integer‑overflow vulnerabilities that affect a broad set of Siemens networking and communication modules — SIMATIC NET CP, SINEMA Remote Connect Server, and many SCALANCE and RUGGEDCOM devices — and operators must treat the...
  10. Siemens SSA-712929 and CVE-2022-0778: OpenSSL DoS in Industrial Devices

    Siemens’ sprawling product portfolio remains at the center of a major, ongoing industrial‑security effort after a broad advisory—originally published by Siemens ProductCERT and republished by U.S. cyber authorities—relisted scores of SCALANCE, RUGGEDCOM, SIMATIC, SIMOTION, SIPLUS and related...
  11. Siemens OpenSSL CVE-2021-3712: Patch and mitigate ICS risk (SSA-244969)

    Siemens and upstream OpenSSL vulnerabilities that allow out-of-bounds reads — tracked under CVE-2021-3712 — remain a live operational risk across dozens of Siemens industrial networking, communications, and automation products; Siemens has published ProductCERT guidance and fixes for many...
  12. CISA Sept 16, 2025 ICS Advisories: Urgent Patching & OT/IT Segmentation

    CISA’s September 16, 2025 bulletin consolidates another urgent wave of Industrial Control Systems (ICS) security notices: eight advisories covering Schneider Electric, Hitachi Energy, Siemens, Delta Electronics and multiple Siemens product families, plus an update to a prior Schneider Galaxy...
  13. CVE-2025-7746: XSS in Schneider Electric Altivar Drives—Fixes & Mitigations

    A newly disclosed Cross‑Site Scripting (XSS) vulnerability, tracked as CVE‑2025‑7746, affects a broad set of Schneider Electric Altivar drives and modules — including the ATVdPAC module (fixed in VW3A3530D version 25.0), multiple Altivar Process and Machine drives, and the ILC992 InterLink...
  14. Windows 10 EOL 2025: Plan Your Windows 11 Migration Now

    Microsoft’s countdown clock is now real: with just weeks to go until Microsoft stops issuing security updates and routine support for Windows 10, organisations and home users face a concrete deadline — October 14, 2025 — and must act now to avoid rising exposure and operational disruption...
  15. CISA ICS Advisories Sept 11, 2025: Siemens, Schneider, Daikin Patch Priority

    CISA’s latest bulletin — a compact but consequential package released on September 11, 2025 — flags eleven Industrial Control Systems (ICS) advisories affecting major automation vendors and field devices, including multiple Siemens engineering and network products, several Schneider Electric...
  16. Siemens UMC Vulnerabilities: Critical RCE and DoS; Patch to 2.15.1.3 Now

    Siemens has published a high‑severity ProductCERT advisory (SSA‑722410) describing multiple remotely exploitable vulnerabilities in its User Management Component (UMC), including a stack‑based buffer overflow that Siemens scores as critical and three separate out‑of‑bounds read issues that can...
  17. OT Network Hygiene: Siemens RUGGEDCOM Advisory & Quick Mitigations

    Siemens and U.S. cyber authorities have republished a focused advisory addressing two low‑severity but operationally meaningful vulnerabilities in SINEC OS that affect the RUGGEDCOM RST2428P (6GK6242‑6PA00); the immediate mitigation is straightforward (block discovery UDP ports) but the broader...
  18. Siemens APOGEE PXC and TALON TC: CVE-2025-40757 BACnet File Leak Explained

    Siemens has confirmed a vulnerability in its APOGEE PXC and TALON TC building automation devices that allows an unauthenticated remote actor to retrieve sensitive files — including the device’s encrypted database — over BACnet, a widely used building automation protocol, a weakness now tracked...
  19. CVE-2025-48976 DoS in Siemens IEM-OS: No Patch, Migrate to IEM-V

    Siemens’ Industrial Edge Management OS (IEM‑OS) is exposed to a remotely exploitable denial‑of‑service condition tied to the Apache Commons FileUpload library (tracked as CVE‑2025‑48976), and the vendor’s published guidance makes clear that affected IEM‑OS installs — all reported versions — have...
  20. CVE-2025-40804: Critical Unauthenticated Share Flaw in Siemens SIVaaS

    Siemens’ cloud-hosted SIMATIC Virtualization as a Service (SIVaaS) has been found to expose a network share without authentication — a configuration defect that Siemens has cataloged as CVE-2025-40804 and scored as critical (CVSS v3.1 = 9.1; CVSS v4 = 9.3). This flaw allows unauthenticated...